WP Security Fabric
WP Security Fabric
WP Security Fabric
Executive Summary
Organizations are rapidly adopting digital innovation (DI) initiatives to accelerate
their businesses, reduce costs, improve efficiency, and provide better customer
experiences. Common initiatives involve moving applications and workflows to the
cloud, deploying Internet-of-Things (IoT) devices on the corporate network, and
expanding the organization’s footprint to new branch locations.
84% of security executives
With this evolving infrastructure also come security risks. Organizations must believe the risk of
cope with growing attack surfaces, advanced threats, increased infrastructure cyberattacks will increase1
complexity, and an expanding regulatory landscape. To accomplish their desired
DI outcomes while effectively managing risks and minimizing complexities,
organizations need to adopt a cybersecurity platform that provides visibility
across their environment and a means to manage both security and network
operations easily.
The Fortinet Security Fabric solves these challenges with broad, integrated, and
automated solutions that enable security-driven networking, zero-trust network
access, dynamic cloud security, and artificial intelligence (AI)-driven security
operations. Fortinet offerings are enhanced with an ecosystem of seamless
integrated third-party products that minimize the gaps in enterprise security 77% of security professionals
state that their organization
architectures, while maximizing security return on investment (ROI).
has moved applications
or infrastructure to the
Digital Innovation Is Transforming All Industries
cloud despite known
Across economic sectors worldwide, DI is seen as an imperative to business growth security concerns.3
and improved customer experience. CIOs are generally positive regarding their
DI initiatives, with 61% stating that they have significant cloud, IoT, and mobile
operations already in place.2
From the perspective of cloud service provider IT and cybersecurity leaders, DI translates into a variety of changes to their
network environments. Users are increasingly mobile, and they are accessing the network from locations and endpoints that
are not always under corporate IT control. They are also connecting directly to public clouds to use key business applications,
such as Office 365. Outnumbering the human-controlled endpoints are IoT devices, which are widely distributed, often in
remote and unsupervised locations. Finally, cloud service provider business footprints are diffusing into numerous and far-
flung branches, most of which connect directly to cloud and cellular services, bypassing corporate data centers.
All these changes render obsolete the concept of a defensible network perimeter, requiring cloud service providers to adopt a
new multilayer defense-in-depth strategy.
Cloud service providers offer a wide range of possible deployment models. Businesses can take advantage of Software-as-a-
Service (SaaS) applications and services such as Salesforce or Box. Alternatively, applications designed and deployed in on-
premises environments can be lifted to Infrastructure-as-a-Service (IaaS) or Platform-as-a-Service (PaaS) deployments such
as Amazon Web Services (AWS), Google Cloud Platform (GCP), Microsoft Azure, Oracle Cloud Infrastructure, and IBM Cloud.
2
WHITE PAPER | Fortinet Security Fabric Enables Digital Innovation
Wary of cloud service provider lock-in and aiming to deploy each application and
workload in the cloud for which it is best suited, many organizations have adopted
a multi-cloud infrastructure. The downside of such freedom of choice is the need
to learn the idiosyncrasies of each cloud environment. In addition, they must use
different tools to manage the environment and its security provisions, which
obfuscates visibility and necessitates the use of multiple management consoles
for policy management, reporting, and more. Cloud environments are
dynamic: 74% of companies
Profusion of endpoints across multiple environments have moved an application to
the cloud and then brought it
Endpoints are arguably the most vulnerable nodes in the cloud service provider’s
back on-premises.4
network. The larger providers have thousands of employees, each using multiple work
and personal devices to access network resources. Ensuring cyber hygiene and
up-to-date endpoint security on all these devices is a formidable task. Even more
daunting is the proliferation of IoT devices. By the end of 2019, the number of
active devices exceeded 26.66 billion, and, during 2020, experts estimate that this
number will reach 31 billion.5
IoT devices are present in numerous business contexts. They provide personalized
experiences to retail and hospitality customers, track inventory in manufacturing
and logistics, and monitor devices on factory floors or in power plants.
84% of enterprises have a
Often ruggedized and power-efficient, IoT devices focus on performance, often at multi-cloud strategy. 81%
the expense of security features and secure communication protocols. And unlike point to security as a major
most network-attached devices, IoT equipment is commonly deployed in remote cloud challenge.6
locations, out of doors, or in unstaffed or infrequently staffed facilities (such as
power stations). From these insecure locations, the equipment frequently transmits
critical, sensitive data to on-premises data centers and to cloud services.
IT leaders face four key challenges in designing secure architectures for their
digitally innovating businesses:
3
WHITE PAPER | Fortinet Security Fabric Enables Digital Innovation
This expanded, dynamic attack surface dissolves the once well-defined network
perimeter and the security protections associated with it. It is much easier for
attackers to infiltrate the network, and once inside, they often find few obstacles to
moving freely and undetected to their targets. Therefore, security in DI enterprises
must be multilayered—with controls on every network segment—based on the
assumption that the perimeter will be breached sooner or later. And access to
network resources must be based on least privilege and continuously verified trust.
Up to 40% of new malware
detected on any given
Advanced threat landscape day is zero day or
The cyber-threat landscape is rapidly growing as bad actors attempt to previously unknown.12
circumvent and defeat traditional cybersecurity defenses. Up to 40% of new
malware detected on any given day is zero day or previously unknown.15 Whether
this is driven by increased use of polymorphic malware or the availability of
malware toolkits, the growth of zero-day malware makes traditional, signature-
based malware detection algorithms less effective. In addition, bad actors
continue to utilize social engineering by exploiting static trust methods used
in traditional security approaches. Studies reveal that 85% of organizations
experienced phishing or social engineering attacks this past year.16
As cyber threats become more sophisticated, data incidents and breaches are more
DI initiatives mean that
difficult to detect and remediate. Between 2018 and 2019, the time to identify and enterprise security teams
contain a data breach grew from 266 to 279 days.17 Beyond the ability to detect must deploy protections for 17
and prevent an attempted attack, organizations must also be capable of rapidly different types of endpoints.13
identifying and remediating a successful attack. Over 88% of organizations have
reported experiencing at least one incident in the last year, demonstrating that all
organizations are at risk of an attack and that cyber resiliency is critical.18
4
WHITE PAPER | Fortinet Security Fabric Enables Digital Innovation
However, many organizations are unable to acquire the cybersecurity talent that they
require. Estimates indicate that over 4 million cybersecurity positions are currently left Fortinet Security Fabric
unfilled, and the number is steadily growing.22 This lack of access to necessary talent
nnBroad
is putting organizations at risk, with 67% of CIOs saying that the cybersecurity skills
shortage inhibits their ability to keep up with the pace of change.23 nnAutomated
nnIntegrated
Attackers understand these challenges well, and use it to their advantage.
Organizations must also comply with industry standards, and many struggle to do so. Indeed, less than 37% of
organizations pass their interim Payment Card Industry Data Security Standard (PCI DSS) compliance audit.24 As PCI DSS
is superseded by the PCI Software Security Framework (PCI SSF), these organizations are likely to face even greater
obstacles to remain compliant.
The need to achieve and maintain regulatory compliance has significant impacts on an organization’s ability to achieve
security transformation objectives. For example, of the 71% of organizations that have moved cloud-based applications
back to on-premises data centers, 21% did so to maintain regulatory compliance.25
NGFW
SD-WAN
Figure 1: The Fortinet Security Fabric enables multiple security technologies to work seamlessly together, across all environments and supported by a single
source of threat intelligence, under a single console. This eliminates security gaps in the network and hastens responses to attacks and breaches.
5
WHITE PAPER | Fortinet Security Fabric Enables Digital Innovation
Expediting incident response activities also requires ensuring that security staff is not distracted by other concerns, such
as collecting data for and generating reports for regulatory compliance or the C-suite. Here, the Fortinet Security Fabric
offers automated log aggregation, data correlation, and generation of reports using built-in templates.
6
WHITE PAPER | Fortinet Security Fabric Enables Digital Innovation
Virtual Security-as-
Appliance Machine Cloud a-Service Software
NGFW
NAC Identity Fabric Agent Secure SD-WAN Public Application Data
Access Cloud Security Center
FortiClient
FortiSwitch FortiCWP FortiMail FortiEDR FortiSIEM
Fabric Agent
FortiADC FortiSOAR
FortiGuard Services
7
WHITE PAPER | Fortinet Security Fabric Enables Digital Innovation
Able to identify the devices connected to its network, organizations can then implement zero-trust
access to determine who is using these devices. FortiAuthenticator user identity management
server offers built-in authentication and role-based access control (RBAC), allowing organizations
to implement least privilege and separation of duties on their networks. FortiToken two-factor
authentication tokens strengthen user authentication by enabling multi-factor authentication. This
ensures that compromised user credentials do not provide an attacker with authenticated access to a
user’s account.
When devices are connected to the corporate network, device monitoring and policy enforcement
can be performed over the network. However, enterprise use of mobile devices is growing rapidly, so
enterprise devices may be used offline or on other networks. Installation of FortiClient Fabric Agent
provides visibility into endpoints and implements dynamic access control both on and off of the
corporate network.
Security-driven networking
As enterprise networks and attack surfaces expand with DI, the need to secure these networks
grows. Security-driven networking tightly integrates an organization’s network infrastructure and
security architecture, enabling the network to scale and change without compromising security. Such
integration reduces complexity by minimizing the number of disparate point products. It also makes it
easy to leverage performance improvements, since networking and security appliances are optimized
to work together.
If threats go undetected at the network perimeter, it is essential to prevent them from moving laterally
throughout the network. Intent-based segmentation allows organizations to painlessly accomplish this by
enabling segmentation of the network based upon business needs. Suspicious or malicious internal connections
are blocked by default, and if a zero-day threat is identified after infection, threat intelligence is communicated
through the Security Fabric to ensure that no secondary infections occur.
For this to work, an organization requires security integration across their entire enterprise network,
including branch locations. Fortinet Secure SD-WAN provides optimized network performance and
security integration for branch locations. FortiGate NGFWs integrated into SD-WAN appliances perform
traffic inspection at each branch location. This improves network performance by enabling direct-to-
internet connectivity for SaaS applications and services and enables WAN cost reductions.
Within a branch location, Fortinet Secure SD-Branch enables extension of an organization’s visibility and
centralized security management down to the switching layer. Fortinet Secure SD-Branch consists of
FortiNAC solutions, FortiSwitch secured access switches, and FortiAP wireless access points monitored
and controlled from a FortiGate NGFW. By integrating security across the corporate WANs, businesses
simplify operations by eliminating redundancy and enable rapid, coordinated response to advanced threats.
8
WHITE PAPER | Fortinet Security Fabric Enables Digital Innovation
Fortinet security solutions offer network security, visibility, and control in both public and private
cloud deployments. FortiGate NGFWs are available in a VM form factor. This allows them to provide
cloud-native security automation, VPN connectivity, network segmentation, intrusion prevention, and
an SWG.
Beyond protecting against malicious content, organizations also must ensure that their cloud
deployments are properly configured. Security misconfigurations are a major issue in the public
cloud, with 99% of issues going unreported.34 FortiCWP cloud security analytics provides visibility
and control in public cloud infrastructure, including monitoring of configurations, data security, and
compliance as well as integrated threat management.
Once the cloud infrastructure itself is secured, it is necessary to protect the applications running on
it. A common use of public cloud deployments is hosting web applications and web APIs. FortiWeb
provides these with cloud-native security. FortiWeb web application firewalls (WAFs) protect web
applications from both known and unknown threats using a combination of signature detection, ML,
and AI. In addition, as most web applications use APIs to link to web services and integrate with other
tools, it is critical to secure those web APIs using schema validation and OpenAPI security to protect
against potentially malicious bot activities such as scraping and analytics.
Organizations are also increasingly moving to cloud-based email solutions like Google G Suite and
Microsoft Office 365. Since phishing attacks are a leading cause of security incidents and data
breaches, securing cloud-based email is essential. Available as physical and virtual appliances or as
a hosted service, FortiMail messaging security solutions protect both on-premises and cloud-based
email deployments, including blocking traditional and advanced email threats and providing backup
functionality to avoid the loss of sensitive information.
Beyond web applications and email, many organizations are reliant upon SaaS applications such as
Google G Suite, Box, Microsoft Office 365, Dropbox, and Salesforce. FortiCASB cloud access security
brokers (CASBs) manage the risks of security misconfiguration, provide centralized visibility and
administrative control, deliver data security in SaaS applications, and ensure that SaaS application
configurations maintain regulatory compliance.
FortiGuard AI enables organizations to keep ahead of cyber criminals. FortiGuard Labs collects threat
data from millions of sensors worldwide and partners with over 200 global organizations. Using 5
billion-plus nodes, FortiGuard AI identifies unique features for both known and unknown threats. The
volumes handled by FortiGuard Labs are immense: The team processes over 100 billion web queries
every day and blocks over 3,600 malicious URL requests each second.
As threats grow in sophistication, 100% prevention is no longer possible. Advanced threat detection
capabilities are essential to helping organizations avoid breaches. AI and ML capabilities integrated
into FortiDeceptor, FortiSandbox, and FortiInsight help organizations to identify unknown
adversaries and malware and to uncover and respond to insider threats.
9
WHITE PAPER | Fortinet Security Fabric Enables Digital Innovation
As cyber threats accelerate, organizations must take advantage of strategic automation to more
quickly contain and remediate threats. Using FortiSIEM and FortiAnalyzer, an organization can
achieve global visibility of their network infrastructure and access AI-driven security analytics. Based
on the collected data, security analysts can determine the nature and severity of threats, with support
from FortiAI virtual analyst. But it does not stop at threat detection and prevention; FortiSOAR
employs orchestration and automation to remediate threat intrusions that help overstretched security
operations center (SOC) teams to scale and focus on threat hunting and other mission-critical tasks.
Endpoints also require AI-driven resources throughout their incident response process. FortiEDR
endpoint detection and response (EDR) and FortiClient deliver advanced endpoint protection that
includes vulnerability scanning, patching, and virtual patching and exploit prevention in both online and
air-gapped environments. Additionally, if an endpoint becomes infected, FortiEDR threat detection
and post-infection protection prevents malware from communicating with command and control
servers or moving laterally through the network. Finally, FortiEDR offers risk-based threat response
and online remediation with support for automated remediation recipes.
The FortiManager centralized management platform and FortiAnalyzer centralized logging and
reporting combine to provide single-pane-of-glass visibility and management of an organization’s
entire network infrastructure. This includes single console management, analytics, and workflow
automation.
These capabilities are supported by a number of API-based integrations with Fortinet Fabric-Ready
Partners. Twelve Fabric Connectors provide deep integration with third-party solutions, and API-
based integration is available for over 135 Fabric-Ready Partners. For non-partner solutions, the
Fortinet Security Fabric includes a REST API and DevOps scripts to enable easy integration.
As many organizations are moving operations to the cloud, a single-point-of-access and single-
sign-on (SSO) solution is needed to reduce the complexity of multi-cloud deployments. FortiCloud
provides SSO and portals to 15 Fortinet SaaS and Metal-as-a-Service (MaaS) solutions as well as
a FortiCare services portal. With support for all major public cloud providers, the Fortinet Security
Fabric simplifies any multi-cloud deployment.
For organizations leading the charge in DI, acknowledging, accepting, and properly managing risks is of paramount
importance. The Fortinet Security Fabric is the foundation for this. It unifies security solutions behind a single pane of
glass, makes the growing digital attack surface visible, integrates AI-driven breach prevention, and automates operations,
orchestration, and response. In sum, it enables organizations to create new value with DI without compromising security for
business agility, performance, and simplicity.
10
WHITE PAPER | Fortinet Security Fabric Enables Digital Innovation
1
Nick Lansing, “Making Tough Choices: How CISOs Manage Escalating Threats And Limited Resources,” Forbes and Fortinet, 2019.
2
“The CIO and Cybersecurity: A Report on Current Priorities and Challenges,” Fortinet, May 23, 2019.
3
Jeff Wilson, “The Bi-Directional Cloud Highway: User Attitudes about Securing Hybrid- and Multi-Cloud Environments,” IHS Markit, 2019.
4
Ibid.
5
Gilad David Maayan, “The IoT Rundown For 2020: Stats, Risks, and Solutions,” Security Today, January 13, 2020.
6
“2019 State of the Cloud Report,” Flexera, 2019.
7
Larry Ponemon, “Third-party IoT risk: companies don’t know what they don’t know,” ponemonsullivanreport.com, accessed February 4, 2020.
8
Nirav Shah, “SD-WAN vs. MPLS: Why SD-WAN is a Better Choice in 2019,” Fortinet, September 9, 2019.
9
Kelly Bissell, et al., “The Cost of Cybercrime: Ninth Annual Cost of Cybercrime Study,” Accenture Security and Ponemon Institute, 2019.
10
“2019 Cost of a Data Breach Report,” IBM Security and Ponemon Institute, 2019.
11
“The CIO and Cybersecurity: A Report on Current Priorities and Challenges,” Fortinet, May 23, 2019.
12
According to internal data from FortiGuard Labs.
13
“6 Obstacles to Effective Endpoint Security: Disaggregation Thwarts Visibility and Management for IT Infrastructure Leaders,” Fortinet,
September 8, 2019.
14
According to data from internal Fortinet research.
15
According to internal data from FortiGuard Labs.
16
Kelly Bissell, et al.,“The Cost of Cybercrime: Ninth Annual Cost of Cybercrime Study,” Accenture Security and Ponemon Institute, 2019.
17
“2019 Cost of a Data Breach Report,” IBM Security and Ponemon Institute, 2019.
18
Based off of internal Fortinet research.
19
“The CIO and Cybersecurity: A Report on Current Priorities and Challenges,” Fortinet, May 23, 2019.
20
Kacy Zurkus, “Defense in depth: Stop spending, start consolidating,” CSO, March 14, 2016.
21
“The CIO and Cybersecurity: A Report on Current Priorities and Challenges,” Fortinet, May 23, 2019.
22
““Strategies for Building and Growing Strong Cybersecurity Teams: (ISC)2 Cybersecurity Workforce Study, 2019,” (ISC)2, 2019.
23
“CIO Survey 2019: A Changing Perspective,” Harvey Nash and KPMG, 2019.
24
“2019 Payment Security Report,” Verizon, 2019.
25
Jeff Wilson, “The Bi-Directional Cloud Highway: User Attitudes about Securing Hybrid- and Multi-Cloud Environments,” IHS Markit, 2019.
26
“Making Tough Choices: How CISOs Manage Escalating Threats And Limited Resources,” Forbes and Fortinet, 2019.
27
“Independent Validation of Fortinet Solutions: NSS Labs Real-World Group Tests,” Fortinet, October 14, 2019.
28
“2019 Cost of a Data Breach Report,” IBM Security and Ponemon Institute, 2019.
29
“Independent Validation of Fortinet Solutions: NSS Labs Real-World Group Tests,” Fortinet, October 14, 2019.
30
“Gartner Magic Quadrant Reports,” Fortinet, accessed January 22, 2020.
31
“2019 Data Breach Investigations Report,” Verizon, 2019.
32
Alex Samonte, “TLS 1.3: What This Means For You,” Fortinet, March 15, 2019.
33
Robert Lemos, “Attackers Are Messing with Encryption Traffic to Evade Detection,” Dark Reading, May 15, 2019.
34
Charlie Osborne, “99 percent of all misconfigurations in the public cloud go unreported,” ZDNet, September 24, 2019.
35
Robert Lemos, “Only Half of Malware Caught by Signature AV,” Dark Reading, December 11, 2019.
www.fortinet.com
Copyright © 2021 Fortinet, Inc. All rights reserved. Fortinet®, FortiGate®, FortiCare® and FortiGuard®, and certain other marks are registered trademarks of Fortinet, Inc., and other Fortinet names herein may also be registered and/or common law trademarks of Fortinet. All other product
or company names may be trademarks of their respective owners. Performance and other metrics contained herein were attained in internal lab tests under ideal conditions, and actual performance and other results may vary. Network variables, different network environments and other
conditions may affect performance results. Nothing herein represents any binding commitment by Fortinet, and Fortinet disclaims all warranties, whether express or implied, except to the extent Fortinet enters a binding written contract, signed by Fortinet’s General Counsel, with a purchaser
that expressly warrants that the identified product will perform according to certain expressly-identified performance metrics and, in such event, only the specific performance metrics expressly identified in such binding written contract shall be binding on Fortinet. For absolute clarity, any
such warranty will be limited to performance in the same ideal conditions as in Fortinet’s internal lab tests. Fortinet disclaims in full any covenants, representations, and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change, modify, transfer, or otherwise
revise this publication without notice, and the most current version of the publication shall be applicable. Fortinet disclaims in full any covenants, representations, and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change, modify, transfer, or otherwise
revise this publication without notice, and the most current version of the publication shall be applicable.
wp-fortinet-security-fabric-enables-digital-innovation
570099-A-0-EN